Attackers utilizing mid-range wireless technologies, like WiFi, to set up a C2 channel, allowing for control within a localized area.